The most successful businesses are those with confidence in their ability to store, access and use data effectively. Rather than focusing on the nuts and bolts of storage, this view point looks at the data it holds and more importantly, what can be done with it.

This review looks at why small businesses need to stop being complacent about their networks and at what they can do to maintain their competitive edge as they follow the big boys down the route of increasing collaboration and other bandwidth-hungry applications likely to impact on network performance and availability.

New Trojan besieging Apple's MacOS

Trojan aims to make it difficult for infected users to clean their Macs

Security firm Intego has discovered a new Trojan dropper targeting Apple's Mac operating system that is resilient enough to survive system reboots.

Intego reported finding the OSX/Crisis Trojan which can establish backdoor access to infected machines and installs itself using a stealthy installation process.

The malware reportedly targets Apple's Snow Leopard and Lion operating systems and has built in defences that protect it from reboots - meaning machines will remain infected until the malware is actively removed.

The malware's effect on infected machines depends on the users administrative permissions.

"If the dropper runs on a system with admin permissions, it will drop a rootkit to hide itself. In either case, it creates a number of files and folders to complete its tasks," wrote Intego researcher Lysa Myers.

"The backdoor component calls home every five minutes, awaiting instructions. The file is created in a way that is intended to make reverse engineering tools more difficult to use when analysing the file. This sort of anti-analysis technique is common in Windows malware, but is relatively uncommon for OS X malware."